Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 20:23
Behavioral task
behavioral1
Sample
317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe
Resource
win10v2004-20240226-en
General
-
Target
317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe
-
Size
97KB
-
MD5
40e294ed7c42f1a8172a52442dce2af4
-
SHA1
f8f7b8910558065b017070cb8bd30f69e6c03ce8
-
SHA256
317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5
-
SHA512
5c38469d5ac74e1c2d9bf5f48adca4a4d81aa0315bc4a8fe35b3770b8f5b18e139cb077f92869e2b37cd742a05ae4d359b8023cd5f7d9c7ca8420ed2e487cb32
-
SSDEEP
3072:W6Ccn27mUC7AdYzrV+Dljy/32ubwZZqJ:W6Ccn2xCkdYzrVolu/J0ZZ
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 13 IoCs
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2936-96-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2668-453-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2668-459-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2936-465-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/files/0x000b000000015c52-488.dat UPX behavioral1/memory/2900-504-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2900-595-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2668-958-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1628-961-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2900-1115-0x0000000000400000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2668-1118-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1628-1121-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
pid Process 2900 WindowsService.exe 1628 WindowsService.exe 1164 WindowsService.exe -
Loads dropped DLL 5 IoCs
pid Process 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe -
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2936-96-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2668-453-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2668-459-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2936-465-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x000b000000015c52-488.dat upx behavioral1/memory/2900-504-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2900-595-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2668-958-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1628-961-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2900-1115-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2668-1118-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1628-1121-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2936 set thread context of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2900 set thread context of 1628 2900 WindowsService.exe 33 PID 2900 set thread context of 1164 2900 WindowsService.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe Token: SeDebugPrivilege 1628 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 2900 WindowsService.exe 1628 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2936 wrote to memory of 2668 2936 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 28 PID 2668 wrote to memory of 2464 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 29 PID 2668 wrote to memory of 2464 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 29 PID 2668 wrote to memory of 2464 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 29 PID 2668 wrote to memory of 2464 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 29 PID 2464 wrote to memory of 2884 2464 cmd.exe 31 PID 2464 wrote to memory of 2884 2464 cmd.exe 31 PID 2464 wrote to memory of 2884 2464 cmd.exe 31 PID 2464 wrote to memory of 2884 2464 cmd.exe 31 PID 2668 wrote to memory of 2900 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 32 PID 2668 wrote to memory of 2900 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 32 PID 2668 wrote to memory of 2900 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 32 PID 2668 wrote to memory of 2900 2668 317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe 32 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1628 2900 WindowsService.exe 33 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34 PID 2900 wrote to memory of 1164 2900 WindowsService.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe"C:\Users\Admin\AppData\Local\Temp\317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe"C:\Users\Admin\AppData\Local\Temp\317126c33f32ea5a9b5d87bacb93c8b122d34852cc9f6f6ef1ae91ad12a2d9b5.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GSWTH.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:2884
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:1164
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
97KB
MD5d7024f489cd269a415b3611d03126dd2
SHA10639f6696103ac6fb30a57f2d0486e127be4bb59
SHA256526a7724c58000ae0d9615a2fea0b865d120d9d6ea91b58d7cede1b4d9ce69a4
SHA512543ad5b2c949cb819edaa7aaa216f20a1731adb5859f48c4f9a25b32490082a291ee1e55693930901067b9669cab6b9a1f9e79e59f13a13455b25df32757e786